Intrusion detection based on K-Means clustering and Naïve Bayes classification Z Muda, W Yassin, MN Sulaiman, NI Udzir 2011 7th international conference on information technology in Asia, 1-6, 2011 | 195 | 2011 |
ANOMALY-BASED INTRUSION DETECTION THROUGH K-MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION W Yassin, NI Udzir, Z Muda, MN Sulaiman Proceedings of the 4th International Conference on Computing and Informatics …, 2013 | 124 | 2013 |
Cyber-security incidents: a review cases in cyber-physical systems MN Al-Mhiqani, R Ahmad, W Yassin, A Hassan, ZZ Abidin, NS Ali, ... International Journal of Advanced Computer Science and Applications 9 (1), 2018 | 119 | 2018 |
A K-Means and Naive Bayes learning approach for better intrusion detection Z Muda, W Yassin, MN Sulaiman, NI Udzir Information technology journal 10 (3), 648-655, 2011 | 99 | 2011 |
A cloud-based intrusion detection service framework W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 82 | 2012 |
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ... Applied Sciences 10 (15), 5208, 2020 | 77 | 2020 |
Intrusion detection based on k-means clustering and OneR classification Z Muda, W Yassin, MN Sulaiman, NI Udzir 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 73 | 2011 |
Improving Intrusion Detection Using Genetic Algorithm WY Vahid Moraveji Hashemi, Zaiton Muda Information Technology Journal 12 (11), 2167-2173, 2013 | 38 | 2013 |
K-Means Clustering and Naive Bayes Classification for Intrusion Detection Z Muda, W Yassin, MN Sulaiman, NI Udzir Journal of IT in Asia 4 (1), 13-25, 2014 | 37 | 2014 |
MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW. S Juma, Z Muda, MA Mohamed, W Yassin Journal of Theoretical & Applied Information Technology 72 (3), 2015 | 30 | 2015 |
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 27 | 2014 |
New insider threat detection method based on recurrent neural networks MN Al-Mhiqani, R Ahmad, ZZ Abidin, W Yassin, A Hassan, ... Indones. J. Electr. Eng. Comput. Sci 17 (3), 1474-1479, 2020 | 24 | 2020 |
Cloud forensic challenges and recommendations: A review W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020 | 20 | 2020 |
A new taxonomy of insider threats: an initial step in understanding authorised attack MN Al-Mhiqani, R Ahmad, ZZ Abidin, WM Yassin, A Hassan, ... International Journal of Information Systems and Management 1 (4), 343-359, 2018 | 19 | 2018 |
A HYBRID FRAMEWORK BASED ON NEURAL NETWORK MLP AND K-MEANS CLUSTERING FOR INTRUSION DETECTION SYSTEM WY Mazyar Mohammadi Lisehroodi, Zaiton Muda Proceedings of the 4th International Conference on Computing and Informatics …, 2013 | 18* | 2013 |
Identify of Factors Affecting Information Security Awareness and Weight Analysis Process RA Issam Al-Shanfari, Warusia Yassin International Journal of Engineering and Advanced Technology 9 (3), 534-542, 2020 | 17* | 2020 |
Clustering analysis for malware behavior detection using registry data NA Rosli, W Yassin, MA Faizal, SR Selamat International Journal of Advanced Computer Science and Applications (IJACSA …, 2019 | 15 | 2019 |
Packet Header Anomaly Detection Using Statistical Analysis W Yassin, NI Udzir, A Abdullah, MT Abdullah Springer, 2013 | 15 | 2013 |
Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection WZA Zakaria, MF Abdollah, O Mohd, SMWMSMM Yassin, A Ariffin International Journal of Advanced Computer Science and Applications 13 (5), 2022 | 12 | 2022 |
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing R Baharon, Q Shi, F Abdollah, W Yassin, A Idris International Journal of Communication Networks and Information Security …, 2018 | 9 | 2018 |